Stars
The sli.do Q&A like automator for your question. Become the light of the party!
A fully-modern text-based browser, rendering to TTY and browsers
Diablo devolved - magic behind the 1996 computer game
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
FPGA modules used together with the PCILeech Direct Memory Access (DMA) Attack Software
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
MNT VA2000, an Open Source Amiga 2/3/4000 Graphics Card (Zorro II/III), written in Verilog
Easy and fast file sharing from the command-line.
A Python RESTful API framework for online malware analysis and threat intelligence services.
My prototype of a USB-connected joystick that uses HID protocol, written in C using Atmega microcontrollers.
Noriben - Portable, Simple, Malware Analysis Sandbox
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
elpho framework core - Extension Library for PHp Object-orientation
OpenSSH remote DOS exploit and vulnerable container
Docker image to test HTTP load balancers
Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these s…
NTPD remote DOS exploit and vulnerable container
Making Docker and Kubernetes management easy.
Python bindings for libnetfilter_queue